城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.11.71.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.11.71.216. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 14:46:16 CST 2025
;; MSG SIZE rcvd: 105
216.71.11.68.in-addr.arpa domain name pointer ip68-11-71-216.no.no.cox.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
216.71.11.68.in-addr.arpa name = ip68-11-71-216.no.no.cox.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 201.187.110.98 | attack | Unauthorised access (Nov 28) SRC=201.187.110.98 LEN=52 TTL=105 ID=5968 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 28) SRC=201.187.110.98 LEN=52 TTL=105 ID=18920 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-29 02:12:23 |
| 207.46.13.58 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-29 02:06:27 |
| 129.213.117.53 | attackspam | Nov 28 12:34:16 linuxvps sshd\[4043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.117.53 user=root Nov 28 12:34:18 linuxvps sshd\[4043\]: Failed password for root from 129.213.117.53 port 53079 ssh2 Nov 28 12:40:25 linuxvps sshd\[7508\]: Invalid user server from 129.213.117.53 Nov 28 12:40:25 linuxvps sshd\[7508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.117.53 Nov 28 12:40:27 linuxvps sshd\[7508\]: Failed password for invalid user server from 129.213.117.53 port 15392 ssh2 |
2019-11-29 02:14:15 |
| 183.134.212.25 | attack | Nov 28 17:57:07 MK-Soft-Root1 sshd[11365]: Failed password for backup from 183.134.212.25 port 38622 ssh2 Nov 28 18:00:38 MK-Soft-Root1 sshd[12054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.212.25 ... |
2019-11-29 01:59:28 |
| 141.98.81.66 | attackspambots | RDP brute force attack detected by fail2ban |
2019-11-29 01:50:56 |
| 179.215.204.49 | attack | Automatic report - Port Scan Attack |
2019-11-29 02:15:43 |
| 206.189.47.166 | attackbots | Nov 28 17:16:58 server sshd\[4124\]: Invalid user macanas from 206.189.47.166 Nov 28 17:16:58 server sshd\[4124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166 Nov 28 17:17:00 server sshd\[4124\]: Failed password for invalid user macanas from 206.189.47.166 port 38300 ssh2 Nov 28 17:34:09 server sshd\[8176\]: Invalid user nimic from 206.189.47.166 Nov 28 17:34:09 server sshd\[8176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166 ... |
2019-11-29 01:58:20 |
| 62.73.4.131 | attackspam | Automatic report - XMLRPC Attack |
2019-11-29 02:02:17 |
| 138.0.113.208 | attack | Unauthorized access or intrusion attempt detected from Bifur banned IP |
2019-11-29 01:57:56 |
| 45.184.78.92 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-11-29 02:20:07 |
| 140.143.249.246 | attackspambots | (sshd) Failed SSH login from 140.143.249.246 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 28 16:56:08 andromeda sshd[21156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.246 user=root Nov 28 16:56:10 andromeda sshd[21156]: Failed password for root from 140.143.249.246 port 46352 ssh2 Nov 28 17:19:32 andromeda sshd[23665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.246 user=backup |
2019-11-29 02:25:57 |
| 218.29.83.34 | attack | Nov 26 02:38:41 cumulus sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.29.83.34 user=r.r Nov 26 02:38:43 cumulus sshd[2161]: Failed password for r.r from 218.29.83.34 port 37930 ssh2 Nov 26 02:38:44 cumulus sshd[2161]: Received disconnect from 218.29.83.34 port 37930:11: Bye Bye [preauth] Nov 26 02:38:44 cumulus sshd[2161]: Disconnected from 218.29.83.34 port 37930 [preauth] Nov 26 02:50:57 cumulus sshd[2661]: Invalid user hung from 218.29.83.34 port 44094 Nov 26 02:50:57 cumulus sshd[2661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.29.83.34 Nov 26 02:50:59 cumulus sshd[2661]: Failed password for invalid user hung from 218.29.83.34 port 44094 ssh2 Nov 26 02:50:59 cumulus sshd[2661]: Received disconnect from 218.29.83.34 port 44094:11: Bye Bye [preauth] Nov 26 02:50:59 cumulus sshd[2661]: Disconnected from 218.29.83.34 port 44094 [preauth] Nov 26 02:57:06 cumulus s........ ------------------------------- |
2019-11-29 01:49:00 |
| 142.93.83.218 | attackspambots | $f2bV_matches |
2019-11-29 02:25:28 |
| 163.172.207.104 | attack | \[2019-11-28 12:34:15\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-28T12:34:15.575-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9071011972592277524",SessionID="0x7f26c427b828",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/65263",ACLName="no_extension_match" \[2019-11-28 12:38:04\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-28T12:38:04.793-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9072011972592277524",SessionID="0x7f26c427b828",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/57098",ACLName="no_extension_match" \[2019-11-28 12:41:56\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-28T12:41:56.301-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9073011972592277524",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/6466 |
2019-11-29 01:54:45 |
| 46.101.171.183 | attackspambots | [Thu Nov 28 11:33:38.999052 2019] [:error] [pid 191405] [client 46.101.171.183:61000] [client 46.101.171.183] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 8)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "ws22vmsma01.ufn.edu.br"] [uri "/"] [unique_id "Xd-awgTlpIctpDm1UAOgIgAAAAA"] ... |
2019-11-29 02:14:59 |